Louis hur

@Louishur

Recently, I'm getting to panic.

Singapore
Vrijeme pridruživanja: prosinac 2009.

Tweetovi

Blokirali ste korisnika/cu @Louishur

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Louishur

  1. proslijedio/la je Tweet
    14. sij

    We summarize the monthly activities of the SectorD group in 2019:

    Poništi
  2. 10. sij

    [🎯Red Alert🎯, Jan/10/2020, 22:52:00 ] Iranian🇮🇷 Cyberattacks Are Coming... "In the aftermath of the American killing of Iran’s top general, Qassim Suleimani, Iranian Cyber-Army(SectorD) group, which is supported by the Iran government are trying to attack USA, Japan and Korea.

    Poništi
  3. 9. sij

    [!!!Red Alert!!] China... government is trying to attack Japanese Industry.(中国...政府は日本の産業を攻撃しようとしています。) 1) Targets Automotive and Manufacturing industries in Japan 2) Targets Japanese Chemical Industry and Conglomerates

    Poništi
  4. 8. sij

    過去に、ロシア、中国、中東から、グローバルイベントへのるサイバー攻撃が多数発生しました。 韓国での2018年冬季オリンピックの開会式への攻撃が代表的なものです(脅威レポートの画像を添付)。 中東からの脅威グループもいくつかの問題を作ろうとしています...彼らの声を...

    Poništi
  5. 8. sij

    過去に、ロシア、中国、中東から、グローバルイベントへのるサイバー攻撃が多数発生しました。 韓国での2018年冬季オリンピックの開会式への攻撃が代表的なものです(脅威レポートの画像を添付)。 中東からの脅威グループもいくつかの問題を作ろうとしています...彼らの声を...

    Poništi
  6. 8. sij

    Recently,Again and again. SectorF01 group(Vietnam-linked Cyber Army) is trying to attack Toyota, Other Companies in JAPAN until now from.... July 2019...

    Poništi
  7. 24. pro 2019.

    Have a Merry Xmas & a fulfilling 2020!!

    Poništi
  8. proslijedio/la je Tweet
    2. pro 2019.

    We analyze a spear phishing email against a person deeply involved in the pro-democracy side of the Hong Kong protests:

    Poništi
  9. 23. stu 2019.

    Red Alert ICS SCADA Security & Hacking contest in South Korea

    Poništi
  10. 15. stu 2019.

    NSHC, 양자내성암호로 국가암호공모전 대상

    Poništi
  11. 7. stu 2019.

    [!!! Red Alert !!!] - Nov 8, 2019 - Monthly CTI Report. We are proud to be Asia's leading Offensive Security company which keeps a close eye on the threat activities in world. The ThreatRecon team closely monitors the threat intelligence feeds with a heavy focus in Threat Actor.

    Poništi
  12. proslijedio/la je Tweet
    6. stu 2019.

    Read the summary of our monthly report on suspected state sponsored activity in September 2019:

    Poništi
  13. proslijedio/la je Tweet
    4. stu 2019.

    We have confirmed that one of the hackers who attacked India's nuclear energy sector is using a North Korean self-branded computer produced and used only in the North Korea. And the IP used by one of the hackers was from Pyongyang, North Korea. This is more valuable than malware.

    Poništi
  14. proslijedio/la je Tweet
    2. stu 2019.

    This is an image of the history of malware used by the North Korean hacker group B that hacked the Kudankulam Nuclear Power Plant(KKNPP) in India. A 16-digit string(dkwero38oerA^t@#) is the password that malware uses to compress a list of files on an infected PC.

    Poništi
  15. proslijedio/la je Tweet
    1. stu 2019.

    Malware were distributed to visitors via the North Korea's propaganda website "메아리, Meari()" using Google's Chrome 0-day vulnerability (CVE-2019-13720).

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    30. lis 2019.

    And another North Korean hacker group that destroyed the system by attacking a South Korean nuclear power plant in 2014 also joined India's attack on a nuclear power plant. They have continuously attempted attacks on key figures involved in India's nuclear power plants.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    30. lis 2019.

    This is North Korea's malware used in the attack on India's nuclear power plant. They had infiltrated the South Korean military's internal network in 2016 and stole classified information. And they once destroyed South Korean broadcasting stations and banking systems in 2013.

    Prikaži ovu nit
    Poništi
  18. 31. lis 2019.

    [!!!Red Alert!!!, 19:10:30-14:20pm] North Korean malware found on Indian nuclear plant's network. Furthermore, This malware code also targeted Oman and Israel. The network of India's nuclear power plants was infected with malware created by North Korea's state-sponsored hackers.

    Poništi
  19. 27. lis 2019.

    with friend!! At RCS Submit 2019

    Poništi
  20. 25. lis 2019.
    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·